Transcription

1 Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data security, regardless of the device, its ownership, and the apps that are being used to access the data. App Center delivers a consumer-like user experience for corporate information on both managed and unmanaged devices, without compromising information security. App Center offers advanced mobile application protection capabilities to enable mobile user productivity. Granular application-level policies can be enforced for internal applications, without any source code modifications or SDK integration. Key features App wrapping App Center provides a security wrapper for enterprise mobile applications; a simple and easy wrapping mechanism that does not require source code modifications and enables clear separation of corporate and personal data on the device. App Center can wrap a security and policy management layer around an ios or Android app, without rewriting the application or embedding an SDK. App developers can therefore focus on building the best apps for their users without worrying about app security. App protection policies include user authentication, document sharing, copy/paste capabilities, offline access, 1

2 controlling local data storage and encryption, secure app connectivity and SSL connection certificate management, and other policies for data protection and central management. Enterprise app store App Center enables self-service distribution of apps to employees and other authorized users with roles-based corporate security and data protection. Apps can be revoked quickly and securely when employees leave the organization or devices are no longer active with or without managing the mobile device. Symantec has designed App Center to be extremely easy to use for developers, IT administrators, and users. App Center is typically set up and configured quickly, allowing apps to be distributed with the appropriate corporate branding to employees and other authorized users. App Center app and user policy management features include: Intuitive administrative console Simple app addition, updating, and revocation Easy user onboarding Comprehensive reporting on managed app and content downloads Secure App Center offers a secure app that brings corporate , calendar, contacts, and tasks to the users. IT administrators can configure secure access to either via native or with third-party clients, such as Nitrodesk TouchDown and Symantec Secure . This enables secure mobile delivery from mail servers, such as Microsoft Exchange, Office 365, Gmail, and Lotus Notes using Microsoft Exchange ActiveSync. Secure can be delivered without mobile device management (MDM) usage, so enterprises can deploy it with minimal impact on personal devices, while ensuring the security of corporate data. A secure proxy provides end-to-end security for traffic, verifying device compliance before allowing connection to the network. Secure Web Secure Web, a secure Web browser, provides safe access to internal Web-based applications and content. Employees gain anytime, anywhere access to , calendars, contacts, tasks, notes, documents, and internal Web-based apps. To protect data in transit, a secure app proxy serves as a virtual network gateway for incoming traffic. And with Secure Web, administrators can apply data control policies, such as limiting the apps in which attachments can be opened. Integrated threat protection App Center integrates leading-edge mobile threat protection that defends both users and the enterprise against malware, greyware, privacy risks, performance risks, fraudulent websites and other digital threats. Powered by Norton Mobile Insight, a dynamic intelligence system that analyzes more than 30,000 apps each day and 200 app stores worldwide, including Google Play, Symantec s mobile threat protection applies real-world information on actual behaviors to protect privacy, detect malware, and mitigate performance risks such as battery drain. Mobile threat protection is centrally managed through the App Center console where administrators can set threat compliance requirements and remediation. Device management App Center also integrates MDM capabilities, providing increased visibility and control over smartphones and tablets. It enables devices to access key corporate assets, such as enterprise Wi-Fi, VPN, secure , native , and calendar apps for corporate accounts. It ensures corporate compliance by enabling advanced security settings on devices and allowing 2

3 the enterprise to locate, lock, and wipe the device. App Center can also leverage the latest ios 7 settings, Apple s updated Volume Purchase Program, and per-app settings. Authentication and single sign-on App Center provides authentication for the App Center portal and wrapped apps, as well as integrated single sign-on functionality across the wrapped in-house and third-party apps. App Center leverages popular authentication methods, such as Active Directory, LDAP, SAML, and Symantec O3 Web gateway. Certificate distribution management App Center integrates with Symantec MPKI to provide simple and secure distribution of security certificates to mobile devices for use in enabling more secure access to VPNs, Wi-Fi, and Exchange ActiveSync services. With integrated MPKI, administrators can now distribute and manage certificates for mobile users without requiring interaction with end users. Secure app connectivity App Center can enforce a secure SSL connection for wrapped apps and block the apps from going to unauthorized or malicious websites. This app wrap policy can mandate an SSL connection to ensure information security for HTTP data-in-transit. A secure app proxy protects data in transit with per-app SSL, FIPS tunnels, separating corporate and personal traffic and simplifying compliance by controlling app communication without requiring a device-level VPN or firewall modifications. App security policies App Center provides the capability for mobile administrators to wrap a layer of security and policy management around an ios or Android app, without requiring additional coding. The developer simply uses an existing.ipa (ios) or.apk (Android) target or Web app. The IT administrator creates policies and chooses the policies to be applied to the app. App Center automatically unpacks, updates, and repacks the apps with a policy management layer prior to the app distribution process. At runtime on the user device, this layer then automatically enforces policies such as: Granular security for apps and content User authentication, re-authentication, and single sign-on Data encryption (FIPS-certified algorithms) Local data storage policy control Enabling offline access Enabling document sharing, copy/paste, or other APIs Additionally, since all corporate app data written locally is managed by an app-level policy, an administrator can revoke both the app code and corporate data on demand, without affecting the user s personal data on the device, with or without MDM. Content distribution App Center provides an easy way for administrators to distribute content to end-user mobile devices. Administrators can distribute documents and multimedia content in different file formats to ios and Android devices. For ios devices, IT can apply appropriate file-level security policies. Content management features include: Intuitive administrative console Expire, update, and revoke content seamlessly Notifications for content updates 3

4 Key benefits App Center enables secure distribution of apps, data, and content files, with appropriate corporate security and branding wrappers, to employees and other authorized users. Apps, data, and content files can be revoked quickly when users or devices are no longer authorized. App Center provides the ability to wrap a layer or security and policy management around an ios or an Android app, without any additional source code modifications or SDK embedding. With App Center, administrators and app developers do not have to be security experts to deliver secure enterprise apps, nor do they have to manage the device. App Center offers a simple, intuitive user experience that is similar to the native experience offered by popular mobile platforms. This leads to rapid adoption with reduced IT support to enable productivity. Symantec Sealed Program The Symantec Sealed Program enables enterprises to confidently embrace third-party mobile apps while meeting data security requirements. The apps in the Sealed Program have been wrapped with a layer of security and management, allowing IT to define granular policies, such as encryption, authentication, and data-sharing restrictions. It delivers an ecosystem of trusted and secure third-party mobile apps, allowing you to provide a protected mobile workspace and fulfill the promise of mobile productivity. System requirements SaaS version No installation needed for the hosted (SaaS) version of the product On-premises version Red Hat Enterprise Linux (RHEL) 6.4 CentOS 6.4 Oracle 11.2 MySQL 5.1 Supported platforms ios 6+ Android 2.3, 4.0, and higher BlackBerry More Information Visit our website To speak with a Product Specialist in the U.S. Call toll-free 1 (800) To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our website. 4

5 About Symantec Symantec protects the world s information, and is a global leader in security, backup, and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities, and interactions gives our customers confidence in a connected world. More information is available at or by connecting with Symantec at go.symantec.com/socialmedia. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners /14 5

Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability

SOLUTION BRIEF: SYMANTEC SEALED PROGRAM GUIDE........................................ Symantec Sealed Program Guide Who should read this paper The purpose of this document is to define the program, outline

The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically

Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman

SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often

What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

BYOD 2.0: Moving Beyond MDM BYOD has quickly transformed IT, offering a revolutionary way to support the mobile workforce. The first wave of BYOD featured MDM solutions that controlled the entire device.

WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central

WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance

WHITE PAPER: DON T LOSE THE DATA: SIX WAYS YOU MAY BE LOSING........ MOBILE....... DATA......................... Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It Who should

Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview What is AppConnect? AppConnect is a MobileIron product that secures and protects enterprise mobile apps. It manages the complete lifecycle

Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should

ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work

Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more

Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from